rev'ed pref w.avg status watch 
  3 
  (3.3) 
  1. 
  On Obfuscating Point Functions  
  1 
  (5.7) 
  2. 
  Logcrypt: Forward Security and Public Verification for Secure Audit Logs  
  1 
  (1.1) 
  3. 
  Cryptanalysis of Hiji-bij-bij (HBB)  
  2 
  (4.2) 
  4. 
  Benes and Butterfly schemes revisited  
  2 
  (4) 
  5. 
  A sufficient condition for key-privacy  
  2 
  (3.9) 
  6. 
  A Metric on the Set of Elliptic Curves over ${mathbf F}_p$.  
  3 
  (*) 
  7. 
  The Misuse of RC4 in Microsoft Word and Excel  
  3 
  (4.6) 
  8. 
  Comments on "Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004  
  2 
  (5) 
  9. 
  Mixing properties of triangular feedback shift registers  
  2 
  (3.7) 
  10. 
  Update on SHA-1  
  2 
  (2.1) 
  11. 
  An Improved Elegant Method to Re-initialize Hash Chains  
  2 
  (5.1) 
  12. 
  Efficient Certificateless Public Key Encryption  
  3 
  (5.5) 
  13. 
  Comments: Insider attack on Cheng et al.s pairing-based tripartite key agreement protocols  
  3 
  (3.3) 
  14. 
  A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words  
  3 
  (3.9) 
  15. 
  Hierarchical Identity Based Encryption with Constant Size Ciphertext  
  3 
  (4.1) 
  16. 
  Narrow T-functions  
  2 
  (2.6) 
  17. 
  Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives  
  2 
  (3.4) 
  18. 
  Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys  
  1 
  (5.4) 
  19. 
  The Full Abstraction of the UC Framework  
  1 
  (4) 
  20. 
  (De)Compositions of Cryptographic Schemes and their Applications to Protocols  
  3 
  (3.2) 
  21. 
  Partial Hiding in Public-Key Cryptography  
  1 
  (3.4) 
  22. 
  An Improved and Efficient Countermeasure against Power Analysis Attacks  
  3 
  (2.3) 
  23. 
  A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness  
  2 
  (3.1) 
  24. 
  On the Diffie-Hellman problem over $GL_{n}$  
  2 
  (4.1) 
  25. 
  Analysis of Affinely Equivalent Boolean Functions  
  3 
  (5.2) 
  26. 
  Techniques for random maskin in hardware  
  4 
  (4.8) 
  27. 
  Tag-KEM/DEM: A New Framework for Hybrid Encryption  
  3 
  (4.1) 
  28. 
  Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage  
  3 
  (3.5) 
  29. 
  A model and architecture for pseudo-random generation with applications to /dev/random  
  3 
  (2.9) 
  30. 
  Weak keys of pairing based Diffie Hellman schemes on elliptic curves  
  3 
  (4.1) 
  31. 
  The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves  
  3 
  (2.7) 
  32. 
  On the Notion of Statistical Security in Simulatability Definitions  
  3 
  (2.8) 
  33. 
  A Flexible Framework for Secret Handshakes  
  3 
  (3.2) 
  34. 
  An Efficient CDH-based Signature Scheme With a Tight Security Reduction  
  3 
  (3.8) 
  35. 
  Concurrent Composition of Secure Protocols in the Timing Model  
  3 
  (4) 
  36. 
  Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes  
  4 
  (3.1) 
  37. 
  Distinguishing Stream Ciphers with Convolutional Filters  
  3 
  (3.2) 
  38. 
  Unfairness of a protocol for certified delivery  
  3 
  (4.2) 
  39. 
  On the Security of a Group Signature Scheme with Strong Separability  
  3 
  (4.7) 
  40. 
  Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications  
  3 
  (2.6) 
  41. 
  An Efficient Solution to The Millionaires Problem Based on Homomorphic Encryption  
  3 
  (3.8) 
  42. 
  On the affine classification of cubic bent functions  
  2 
  (4.5) 
  43. 
  Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3  
  2 
  (3.2) 
  44. 
  New Approaches for Deniable Authentication  
  2 
  (4.7) 
  45. 
  Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme  
  2 
  (5.4) 
  46. 
  Cryptanalysis of two identification schemes based on an ID-based cryptosystem  
  2 
  (4.5) 
  47. 
  Adversarial Model for Radio Frequency Identification  
  2 
  (3.1) 
  48. 
  David Chaum's Voter Verification using Encrypted Paper Receipts  
  2 
  (1.5) 
  49. 
  A Note on Shor's Quantum  Algorithm for Prime Factorization  
  1 
  (2.6) 
  50. 
  Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems  
  3 
  (3.7) 
  51. 
  An Approach Towards Rebalanced RSA-CRT with Short Public Exponent  
  4 
  (4.3) 
  53. 
  Untraceability of Two Group Signature Schemes  
  5 
  (4) 
  54. 
  Key Derivation and Randomness Extraction  
  3 
  (2.6) 
  101. 
  A sufficient condition for key-privacy